QENEX Lab

Cryptographic provenance for UK research outputs. Researchers authenticate via their institutional identity (UK Access Management Federation), submit a research artifact, and receive an Ed25519-signed receipt that is independently verifiable against three external rails: a qualified RFC 3161 timestamp from the Belgian BOSA TSA, an OpenTimestamps Bitcoin proof, and a private Sigstore Rekor transparency-log entry.

Operated by QENEX LTD (UK Companies House #16523814), London. Single-server, no hyperscaler dependency, no AWS/Azure/Cloudflare in the production data path. See /security/ for the full architecture.


1. System identity (for UKAMF reviewers and procurement)

PropertyValue
SAML SP entityIDhttps://lab.qenex.ai/sp
Assertion Consumer Service (ACS)https://auth.qenex.ai/realms/qenex/broker/ukamf/endpoint
NameID formaturn:oasis:names:tc:SAML:2.0:nameid-format:persistent
SAML bindingHTTP-POST
SP signing certificateECDSA P-256, 2-year validity (2026-05-19 → 2028-05-18)
SP signing cert SHA-256F9:BD:1F:69:9B:A3:59:06:3F:68:FB:FC:A9:74:DA:E9:9D:56:65:6F:6F:AF:52:67:85:7C:BC:10:11:2E:EF:4F
UKAMF membershipApplication submitted to Jisc via the federation member sign-up form 2026-05-19; metadata XML and SP cert published. Review timeline ~2 weeks. Until approval, the IdP broker accepts the UKAMF test-federation hub for integration testing.
Attribute release expected from member IdPseduPersonScopedAffiliation (required), mail (required), eduPersonPrincipalName, cn, eduPersonOrcid (all optional). Minimal release supported; richer release improves receipt identity binding.

SAML SP metadata XML (for federation auditors): produced from the same cert + entityID as above. Available on request to ceo@qenex.ai. The metadata is not published as a public download because UKAMF distributes it via the federation hub once organisational membership is approved.


2. What a receipt asserts

Every research output anchored through QENEX Lab produces a JSON receipt containing the artifact hash, the operator Ed25519 signature, a hash chain link to the previous receipt, and three external timestamp / transparency proofs.

FieldMeaningWhat it proves without trusting QENEX
sha256SHA-256 of the canonical research-output bytesThe artifact is binary-identical to what the researcher submitted (computable by anyone with a copy).
ed25519_signature_b64Ed25519 signature by the QENEX operator key over the canonical receipt JSONThe receipt was issued by the holder of the operator private key. Pubkey is published; fingerprint below.
previous_entry_sha256SHA-256 of the prior receipt under the same canonical formThe chain is tamper-evident; altering any historical receipt breaks the next link.
rfc3161_tsr_sha256SHA-256 of an RFC 3161 TimeStampResp issued by the Belgian BOSA TSAThe receipt SHA-256 existed at or before the TSR's gen_time, attested by an EU Trust-Listed qualified TSP under eIDAS Article 41(2).
ots_proof_sha256SHA-256 of an OpenTimestamps proof anchored to the Bitcoin chainPermissionless decentralised existence proof, verifiable offline against a Bitcoin block header.
rekor_urlURL of the corresponding entry in rekor.qenex.ai (private Sigstore transparency log)Transparency-log inclusion; supplements the external rails with a tamper-evident operator log.
identities (schema v1.1)Array of researcher identities released by the UKAMF IdP (EPPN, ORCID, affiliation, institution)The submitter authenticated to a UKAMF-member institution at the moment of anchoring; the identity is bound to the receipt by the same Ed25519 signature.

Operator pubkey fingerprint (SHA-256 of the raw 32-byte Ed25519 public key, not the SPKI envelope): 87716f63029851a3339495d6fccd7f5c0f4c5bde8bcc2a39e827b969ce11ccc0. Every receipt asserts this value under operator_pubkey_sha256; the public key itself is at /.well-known/qenex-operator-pubkey.pem on the apex.


3. Researcher workflow (for first-paid-pilot PIs)

  1. Authenticate via your institutional identity provider through the UK Access Management Federation. After UKAMF approval, this is a one-click flow from your institution's IdP discovery page.
  2. POST the artifact metadata to https://lab.qenex.ai/api/v1/lab/discoveries with a Bearer token from the lab-researcher OIDC scope. The endpoint accepts a discovery_id and an arbitrary payload; the payload is SHA-256-hashed at ingest and the hash (not the payload) is what gets anchored.
  3. Receive an anchor_id in under 5 ms. The receipt is written to the deploy-log immediately; the three external rails (TSR + OTS + Rekor) backfill asynchronously within 15 minutes via a host-side timer.
  4. Retrieve the receipt via GET https://lab.qenex.ai/api/v1/lab/receipt/{anchor_id}. The receipt is world-readable; pre-publication artifacts only release the hash, not the content. Anyone with the artifact can independently verify the receipt against the rails.
  5. Cite the receipt alongside your publication. Recommended citation format includes the anchor_id, the receipt SHA-256, and the BOSA gen_time from the TSR. Citation grammar is described at /legal/evidence/.

Free tier available for read-only verification and small-volume submissions. Compliance tier (per the Pulse pricing) is required for institutional volumes, custom regulatory packs, and dedicated success engineering. Contact ceo@qenex.ai to request a sandbox tenant before institutional commitment.


4. Independent verification

Every claim on this page is reproducible by a third party without contacting QENEX. The verification chain has two layers.

Layer 1 — operator infrastructure discipline

Every deploy of qenex.ai itself produces an Ed25519-signed hash-chained entry in /.well-known/deploy-log.json. The 60-line Python verifier at /docs/deploy-verification/ independently verifies every signature + chain link + RFC 3161 TSR + OpenTimestamps proof. Any byte that ships to production is auditable; any tamper after-the-fact breaks the chain.

Layer 2 — research-output receipt verifier (Apache 2.0)

The qenex-verifier reference implementation is open source under Apache 2.0. It accepts a receipt and an operator pubkey, and returns OK / INVALID for each rail independently.

The Apache 2.0 verifier reproduces every numerically-verifiable claim in the v2 ChemRxiv preprint (QENEX LAB v2 supplementary information). Sovereign components above the verifier-subset sovereignty boundary — the autonomous discovery engine, the Sigstore stack, the multi-provider AI gateway — remain QENEX LTD proprietary; the public surface ships the verification side intentionally and only.


5. Open posture

Legal entityQENEX LTD — UK Companies House #16523814
Registered office20 Wenlock Road, London, N1 7GU, United Kingdom
Operator (Director, single signatory)Abdulrahman Sameer R Almutairi — ORCID 0009-0004-4797-2226
HostingOVH UK bare-metal, London (Erith). No hyperscaler in the production data path.
Authoritative DNSSelf-hosted CoreDNS at ns1.qenex.ai.
Trust posture/trust/ — live signed scorecard.
Business continuity/trust/business-continuity/ — honest key-person risk disclosure, deputy onboarding scheduled 2026 Q3.
Contactceo@qenex.ai · UKAMF technical contact: admin@qenex.ai
Responsible disclosure/legal/responsible-disclosure/

This page is itself anchored. The next deploy of qenex.ai writes an Ed25519-signed entry to the deploy log referencing the SHA-256 of this HTML. A reviewer who suspects this page was modified after publication can verify the page hash against the public deploy-log chain via the recipe at /docs/deploy-verification/.